13
If Your Mission Is To Stop Advanced Threats … Join the hunt

BluVector Threat Categories

Embed Size (px)

Citation preview

Page 1: BluVector Threat Categories

If Your Mission Is To Stop Advanced Threats …

Join the hunt

Page 2: BluVector Threat Categories

Learn more at: www.bluvectorcyber.com

THREATSA potential cause of an unwanted incident, which may result in harm to a system or organization.

Follow us on LinkedIn

Page 3: BluVector Threat Categories

Learn more at: www.bluvectorcyber.com

ACTIVE THREATSAn active attack is a network exploit in which a hacker attempts to make changes to data on the target or data enroute to the target.

TYPES OF ACTIVE THREATSIn a masquerade attack, the intruder pretends to be a particular user of a system to gain access or to gain greater privileges than they are authorized for by the administrator.

Page 4: BluVector Threat Categories

Learn more at: www.bluvectorcyber.com

ADVANCED PERSISTANT THREAT (APT) A network attack in which an unauthorized person gains access toa network and stays there undetected for a long period of time.The intention of an APT attack is to steal data rather than to causedamage to the network or organization.

Page 5: BluVector Threat Categories

Learn more at: www.bluvectorcyber.com

BOT NET THREATThe word Botnet is formed from the words ‘robot’ and ‘network’. A botnet is an interconnected network of computers infected with malware without the user's knowledge and controlled by cybercriminals. They're typically used to send spam emails, transmit viruses and engage in other acts of malice or mayhem. Sometimes known as a zombie army, botnets are often considered one of the biggest online threats today.

Page 6: BluVector Threat Categories

Learn more at: www.bluvectorcyber.com

REMOTE ACCESS TOOLS (RATS)A remote access trojan (RAT) is a malware program that includes a back door for administrative control over the target computer. RATs are usually downloaded invisibly with a user-requested program -- such as a game -- or sent as an email attachment that has the code embedded like a Trojan in a hollow wooden horse.

Follow us on LinkedIn

Page 7: BluVector Threat Categories

Learn more at: www.bluvectorcyber.com

ADVANCED EVASION TECHNIQUESA type of network attack that combines several different known evasion methods to create a new technique that’s delivered over several layers of the network simultaneously

Page 8: BluVector Threat Categories

Learn more at: www.bluvectorcyber.com

TOR – P2P – I2PInternet traffic via a free, anatomized, worldwide, volunteer networks consisting of more than seven thousand to conceal a user’s location and usage from anyone conducting network surveillance or traffic analysis.

Follow us on LinkedIn

Page 9: BluVector Threat Categories

Learn more at: www.bluvectorcyber.com

ZERO DAY MALWAREZero-day malware is an undisclosed computer-software vulnerability that hackers can exploit to adversely affect computer programs, data, additional computers or a network. It is known as a “zero-day” because it is not publicly reported or announced before becoming active, leaving the software’s author with zero days in which to create patches or advise workarounds to mitigate against its actions.

Page 10: BluVector Threat Categories

Learn more at: www.bluvectorcyber.com

LEGACY MALWAREShort for “malicious software,” malware refers to software programs designed to damage or do other unwanted actions on a computer system. In Spanish, “mal” is a prefix that means “bad,” making the term “badware,” which is a good way to remember it (even if you’re not Spanish). Common examples of legacy malware include viruses, worms, trojan horses, and spyware.

Page 11: BluVector Threat Categories

Learn more at: www.bluvectorcyber.com

POLYMORPHIC MALWARECode that uses a mutation engine to modify the original code in a malicious manner, while keeping the original algorithm intact, so that the software functions as intended and the malware goes undetected.

Page 12: BluVector Threat Categories

Learn more at: www.bluvectorcyber.com

MOBILE MALWAREMalware that is designed to infiltrate systems via mobile devices such as tablets and smart phones.

Follow us on LinkedIn

Page 13: BluVector Threat Categories

Learn more at: www.bluvectorcyber.comLearn more at www.bluvectorcyber.com

SUPERCHARGE YOUR HUNTERSMachine learning based investigative analytics ID relationships and & linkages in data while developing threat profiles at digital speed. Enable your security staff to rapidly and efficiently zero in on the meaningful threats amidst all the noise.

“The BluVector Malware detection platform

outperformed the vendor average by 18%, making its

detection capability amongst the highest on the market.”

-Robert Smithers, CEO, Miercom, 2016 Follow us on LinkedIn